Sciweavers

3096 search results - page 509 / 620
» Ontology: Use and Abuse
Sort
View
ICDM
2006
IEEE
176views Data Mining» more  ICDM 2006»
14 years 3 months ago
Razor: mining distance-constrained embedded subtrees
Due to their capability for expressing semantics and relationships among data objects, semi-structured documents have become a common way of representing domain knowledge. Compari...
Henry Tan, Tharam S. Dillon, Fedja Hadzic, Elizabe...
ELPUB
2006
ACM
14 years 3 months ago
An Architecture of Authoring Environments for the Semantic Web
Among the new possibilities that the Semantic Web has enabled, the authoring task is considered as a key moment for semantic representation of knowledge to enhance publishing need...
Edgard Costa Oliveira, Mamede Lima-Marques
ICALT
2005
IEEE
14 years 2 months ago
Empirical Validation of Concept Maps: Preliminary Methodological Considerations
For their usage in the semantic web, valid ontologies are required for a given domain. Here we focus on ontologies represented as concept maps (semantic nets). For one and the sam...
Dietrich Albert, Christina M. Steiner
GI
2005
Springer
14 years 2 months ago
Distributed User Modeling for Situated Interaction
: A distributed service to model and control contextual information in mobile and ubiquitous computing environments is presented in this paper. We introduce the general user model ...
Dominik Heckmann
NLDB
2005
Springer
14 years 2 months ago
Natural Language Processing: Mature Enough for Requirements Documents Analysis?
Requirements engineering is the Achilles’ heel of the whole software development process, because requirements documents are often inconsistent and incomplete. Misunderstandings ...
Leonid Kof